Secret sharing approach for securing cloud-based pre-classification volume ray-casting
暂无分享,去创建一个
[1] James A. Thom,et al. Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.
[2] Denis Vazhenin,et al. Cloud-based web-service for health 2.0 , 2012, HCCE '12.
[3] Marten van Sinderen,et al. Cloud Computing and Services Science , 2014, Service Science: Research and Innovations in the Service Economy.
[4] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[5] Eyal Kushilevitz,et al. Secret sharing over infinite domains , 1993, Journal of Cryptology.
[6] Pradeep K. Atrey,et al. Secure Cloud-Based Volume Ray-Casting , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[7] Ying Luo,et al. Privacy protected image denoising with secret shares , 2012, 2012 19th IEEE International Conference on Image Processing.
[8] Lein Harn,et al. Authenticated Group Key Transfer Protocol Based on Secret Sharing , 2010, IEEE Transactions on Computers.
[9] Octavian Catrina,et al. Secure Computation with Fixed-Point Numbers , 2010, Financial Cryptography.
[10] Pradeep K. Atrey,et al. Homomorphic Low Pass Filtering on Encrypted Multimedia over Cloud , 2013, 2013 IEEE Seventh International Conference on Semantic Computing.
[11] Marc Levoy,et al. Display of surfaces from volume data , 1988, IEEE Computer Graphics and Applications.
[12] J. Seberry,et al. Secret sharing schemes arising from latin squares , 1994 .
[13] Tim Mather,et al. Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.
[14] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[15] Kevin J. Henry. The Theory and Applications of Homomorphic Cryptography , 2008 .
[16] Matthias J. Müller,et al. Color-coded diffusion-tensor-imaging of posterior cingulate fiber tracts in mild cognitive impairment , 2005, Neurobiology of Aging.
[17] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[18] Li Bai,et al. A Cloud Computing Medical Image Analysis and Collaboration Platform , 2011, CLOSER 2011.
[19] Pradeep K. Atrey,et al. Secure cloud-based medical data visualization , 2012, ACM Multimedia.
[20] Pradeep Dubey,et al. Mapping High-Fidelity Volume Rendering for Medical Imaging to CPU, GPU and Many-Core Architectures , 2009, IEEE Transactions on Visualization and Computer Graphics.
[21] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[22] Thomas Friese,et al. A Cloud-Deployed 3D Medical Imaging System with Dynamically Optimized Scalability and Cloud Costs , 2011, 2011 37th EUROMICRO Conference on Software Engineering and Advanced Applications.
[23] Adi Shamir,et al. How to share a secret , 1979, CACM.
[24] Noboru Sonehara,et al. Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.